Results 41 to 50 of about 3,158,126 (357)

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

Authenticity in Criminal Law, Criminalistics and Forensic Science

open access: yesTheory and Practice of Forensic Science, 2023
The authenticity of products, documents and some other objects is of paramount importance in all areas of human activity. Illicit manufacturing of the counterfeit goods, documents, money, and a number of other objects entails legal liability, including criminal.The questions about authenticity are commonly put before experts when appointing several ...
A. Y. Asnis, S. N. Khaziev
openaire   +2 more sources

Verivication of Considered Cause (Ta'lil al-Ahkam) in Worships from I'lam al-Muwaqi'in | تعليل الأحكام في العبادات من إعلام الموقعين

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2018
Verification of considered cause (ta’līl al-ahkām) together with the objectives of Shariah (maqāsid al-Sharī’ah) is among the most important issues discussed by the experts of Jurisprudence. This article analyses the procedures of establishing causes for
Zuhrotul Aini Mansur
doaj   +1 more source

Authentication with Distortion Criteria [PDF]

open access: yes, 2005
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks.
Chen, Brian   +2 more
core   +2 more sources

Ibnu Qayyim Al-Jauziyyah's Ways to Verification of Considered Cause | طرق تعليل الأحكام عند الإمام ابن قيم الجوزية

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2009
Verification of considered cause ( ta'lil al-ahkiim) together with the objectives of Shariah (maqiisid al-Shari'ah) is among the most important issues discussed by the experts of Jurisprudence.
Zuhrotul Ain Mansur
doaj   +1 more source

Detection of replay attacks in cyber-physical systems using a frequency-based signature [PDF]

open access: yes, 2019
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop ...
Escobet Canal, Teresa   +5 more
core   +2 more sources

PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN

open access: yesJurnal Cakrawala Hukum, 2013
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj   +1 more source

Wood identification services in support of legal supply chains: A market study

open access: yesSustainable Futures, 2023
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen   +2 more
doaj   +1 more source

The Concept of Rights: Views of Bentham and Khoei [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2020
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj   +1 more source

Probability on groups and an application to cryptography [PDF]

open access: yesComputer Science Journal of Moldova, 2015
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye   +2 more
doaj  

Home - About - Disclaimer - Privacy